Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Normal charon memory usage?

    Scheduled Pinned Locked Moved IPsec
    18 Posts 6 Posters 6.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      Guest
      last edited by

      We actually had the same amount of tunnels running on a box with dual core and 1gb ram for long time, that was 2.1.X and with racoon we never saw this issue.

      I imagine the same as above, related to the circumstance that the version jump from pfSense 2.1.x to version 2.2.2
      was also a version jump from FreeBSD 8.3 to 10.0.

      I was wondering if anyone else out there has 100+ Ipsec tunnels and not having this issue?

      And I am pretty sure they will be all, earlier or later, coming in the same trap as you.

      Perhaps stronger and more powerful hardware and a pit of more RAM will do it also, without tuning the mbufs
      size, but this is another story.

      1 Reply Last reply Reply Quote 0
      • S
        Stackmgr
        last edited by

        Mbufs are running at 4 to 7% of the default count while RAM is still being consumed.  Not sure how increasing the Mbuf max count will help.

        Logs are set for silent.  Clearing the log has no significant impact on RAM.

        1 Reply Last reply Reply Quote 0
        • ?
          Guest
          last edited by

          Not sure how increasing the Mbuf max count will help.

          Then please read this article that would it perhaps explaining some how better.
          Tuning FreeBSD to serve 100-200 thousands of connections

          1 Reply Last reply Reply Quote 0
          • C
            cmb
            last edited by

            There is a memory leak of some sort in strongswan under some condition(s).

            djamp42: that's the worst I've seen, by far. Especially bad on a system with 2 GB RAM. Could you PM me a copy of your config from <ipsec>to</ipsec> ? Can copy/paste off of status.php which should trim out PSK and cert data which is unnecessary.

            1 Reply Last reply Reply Quote 0
            • D
              djamp42
              last edited by

              I have been changing all my pfsense - pfsense tunnels to IKEv2 as i upgrade them. I do have about 50 pfsense to cisco ASA tunnels that have to stay IKEv1 due to the issues with IKEv2. If someone has this working with a large amount of tunnels i would be more then happy to change my settings to see if it fixes it.

              1 Reply Last reply Reply Quote 0
              • D
                djamp42
                last edited by

                Also we average about 20Mb/s inbound and 50Mb/s output on the ipsec interface. It sounds like i could be running into this issue?

                https://wiki.strongswan.org/issues/964

                1 Reply Last reply Reply Quote 0
                • C
                  cmb
                  last edited by

                  @djamp42:

                  Also we average about 20Mb/s inbound and 50Mb/s output on the ipsec interface. It sounds like i could be running into this issue?

                  https://wiki.strongswan.org/issues/964

                  No, we don't use libipsec.

                  1 Reply Last reply Reply Quote 0
                  • S
                    stemond
                    last edited by

                    if you find a solution please post here

                    1 Reply Last reply Reply Quote 0
                    • C
                      cmb
                      last edited by

                      The most significant leaks are now fixed in 2.2.5.

                      1 Reply Last reply Reply Quote 0
                      • S
                        stemond
                        last edited by

                        Great Work!

                        1 Reply Last reply Reply Quote 0
                        • J
                          jwt Netgate
                          last edited by

                          @cmb:

                          The most significant leaks are now fixed in 2.2.5.

                          Well, we've patched around them, anyway.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.